2003
DOI: 10.1109/jproc.2003.819611
|View full text |Cite
|
Sign up to set email alerts
|

Comparing passwords, tokens, and biometrics for user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
114
1
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 448 publications
(135 citation statements)
references
References 26 publications
0
114
1
1
Order By: Relevance
“…Analysis is done based on knowledge based, object-based and id based substantiation. This is mainly meet this draw backs that are Multi-passwords are less security, Tokens are inconvenient and costly and Inconvenient the user by many false non matches [6]. The invented technology provides a solution for the online learning environment using biometric based substantiation.…”
Section: Related Workmentioning
confidence: 99%
“…Analysis is done based on knowledge based, object-based and id based substantiation. This is mainly meet this draw backs that are Multi-passwords are less security, Tokens are inconvenient and costly and Inconvenient the user by many false non matches [6]. The invented technology provides a solution for the online learning environment using biometric based substantiation.…”
Section: Related Workmentioning
confidence: 99%
“…The results exposed that security boxes are perceived as more dependable by the users [16]. L. Gorman in his study compares passwords, security tokens, and biometrics and there possible combinations for MFA [17]. Different authenticating mechanisms in use as identified by him are; 316  Knowledge-Based (what you know) -characterized by secrecy [17].…”
Section: International Journal Of Advanced Research (Ijar) 315mentioning
confidence: 99%
“…L. Gorman in his study compares passwords, security tokens, and biometrics and there possible combinations for MFA [17]. Different authenticating mechanisms in use as identified by him are; 316  Knowledge-Based (what you know) -characterized by secrecy [17].  Object-Based (what you have) -characterized by physical possession [17].…”
Section: International Journal Of Advanced Research (Ijar) 315mentioning
confidence: 99%
See 2 more Smart Citations